Overview
Books
10 Malware Books
10 recommended Malware books.
Worm: The First Digital World War
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated...
Book: Mastering Malware Analysis: The complete malware analyst’s guide to combating malicious software, APT, cybercrime, and IoT attacks
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as...
Definitions
DEFINITION: Logic bombs
A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time.
DEFINITION: Stealth viruses
A stealth virus uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice. These viruses conceal any increase in the size of an infected file or changes to the file’s date and time of last modification.
DEFINITIONS: Worms
Worms differ from viruses in that they do not attach to a host file, but are self-contained programs that propagate across networks and computers. Worms are commonly spread through email attachments; opening the attachment activates the worm program.
Documents
ADVERSARY INFRASTRUCTURE REPORT 2020: A DEFENDER’S VIEW
Recorded Future’s Insikt Group® conducted a study of malicious command and control (C2) infrastructure identified using proactive scanning methods
McAfee Labs Threats Report Nov 2020
At McAfee, we have focused our threat research teams entirely on ensuring your data and systems remain secure, and for the first time have made available the MVISION
2020 State of Malware Report by Malwarebytes
It was the last year of the 2010s, and cybercriminals let the world know they meant business.
Lexicon
Lexicon: RATs (Remote Access Trojans)
CyberLexicon: CompTIA Security+: Logic or Time bomb - Any code...
Lexicon: Logic or Time bomb
CyberLexicon: CompTIA Security+: Logic or Time bomb - Any code...
Lexicon: Worms
CyberLexicon: CompTIA Security+: Worms - Use the network to replicate...
Quotes
7 Quotes about Malware
“Responders should not rush to kick an attacker out before they’ve got the full picture of what they were looking...
“Responders should not rush to kick an attacker out before they’ve got the full picture…”
Mathias Fuchs - SANS Institute Instructor
“Malware is not only about viruses – companies preinstall it all the time.”
Richard Stallman - Free Software Foundation
Stats
4 in 10 emails that included Coronavirus information were linked to fraud, phishing, or malware.
Source: Bitdefender 2020
Emails Claiming they had Edward Snowden’s new book, Permanent Record, as a Word attachment were infected with Emotet Malware.
Emails Claiming they had Edward Snowden’s new book, Permanent Record, as a Word attachment were infected with Emotet Malware.
Emotet has been the most impactful malware in 2020
Source Avira Protection Labs 2020
Tools
Tools: Resource Hacker
A freeware resource compiler & decompiler for Windows® applications. Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications.
Tools: Yara
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples.
Tools: Cuckoo SandBox
Cuckoo Sandbox is the leading open source automated malware analysis system.